The proceedings contain 39 papers. The special focus in this conference is on datascience and networkengineering. The topics include: Smart Surveillance System and Prediction of Abnormal Activity in ATM Using Deep L...
ISBN:
(纸本)9789819967544
The proceedings contain 39 papers. The special focus in this conference is on datascience and networkengineering. The topics include: Smart Surveillance System and Prediction of Abnormal Activity in ATM Using Deep Learning;a Framework for Extractive Text Summarization of Single Text Document in Tamil Language Using Frequency Based Feature Extraction Technique;an Approach to Mizo Language News Classification Using Machine Learning;BASiP: A Novel Architecture for Abstractive Text Summarization;a Hybrid Approach for Leaf Disease Classification Using Machine Learning and Deep Learning;enhancing Agricultural Decision-Making Through Machine Learning-Based Crop Yield Predictions;Pest Detection Using YOLO V7 Model;random Forest Classifier-Based Acute Lymphoblastic Leukemia Detection from Microscopic Blood Smear Images;FedCNNAvg: Federated Learning for Preserving-Privacy of Multi-clients Decentralized Medical Image Classification;training Algorithms for Mixtures of Normalizing Flows;acute Lymphoblastic Leukemia Detection Using DenseNet Model from Microscopic Blood Smear Images;a Disease Prediction Framework Based on Predictive Modelling;a data-Driven Diabetes Predictive Model Using a Novel Optimized Weighted Ensemble Approach;analysis of Image Caechniques Using Encoder–Decoder;security and Energy Efficiency Enhancement for the Internet of Things: Challenges, Architecture and Future Research;spot Pricing in Cloud Computing: A Comprehensive Survey of Mechanisms, Strategies, and Future Directions;A Comparative Analysis of Propagation Models Suitable for Non-Line-of-Sight 5G Communication at 26 GHz;validating δ-Currency Using Model Checking;a Batch-Service Queueing Assisted Blockchain System for Supply Chain Management;biFrost: A Blockchain-Based Decentralized Messaging Application;priority Based Load Balancing for Intercloud Computing Environments;machine Learning Approach to the Internet of Things Threat Detection.
The proceedings contain 29 papers. The special focus in this conference is on datascience and networkengineering. The topics include: Explainable AI Insights into a Time Series Weather Prediction Model Using Stacked...
ISBN:
(纸本)9789819783359
The proceedings contain 29 papers. The special focus in this conference is on datascience and networkengineering. The topics include: Explainable AI Insights into a Time Series Weather Prediction Model Using Stacked LSTM;patient-Specific and Patient-Independent Seizure Prediction Using Ensemble Learning Technique;an Intuitive and Modular Framework for Enhanced Human-Machine Synergy;Wavelet-Transformed K-NN Pipeline for EEG-Based Eye Blink Classification with Time Wrapping;enabling Cursor Control Through Eye Movement Using Hidden Markov Model;Comparative Study: Word2Vec Versus TF-IDF in Software Defect Predictions;an Improved Deep Learning Framework Based on Multi-Scale Convolutional Architecture for Road Crack Detection;Knowledge Graph Relation Learning Using GAN-BERT;sightAssist: A Multi-facility Machine Learning Approach for Empowering the Visually Impaired;Predicting COVID-19 Cases in India Using ARIMA, Prophet, LSTM and data Analysis Using Power BI;Classification of Muti-Labeled Retinal Diseases in Retinal Fundus Images Using CNN Model ResNet18;LSTM-Based Portfolio Optimization with Gerber Covariance Estimator for Increased Robustness;handwritten Character Recognition from Small Grayscale Images Using Pre-trained Models;Forecasting Heart Disease Using Deep BI-DI Neural networks;emo-Tune: Harnessing Emotion-Based Music for Patient Wellness;Making data Secure in Detecting ADHD with Supervised Learning;an Analysis of Automatic Question Generation Research Progress and Challenges;a Federated Learning Approach Towards a Privacy-Preserving Technique for Brain Tumor Classification;low Cost Emergency Communication System for Disaster Affected Areas;a Slot-Integrated Based Partial Ground and Tapered Patch Antenna for Satellite Communications;a Review on Wireless Power Transfer Systems;application of Big data to Traffic Generated in Mechanisms Containment on Optical Burst Switching Distributed networks;a Real-Time Arm-Worn Sensor-Based Human Fall Alert Notification Mode
India confronted a serious challenge in the initial throes of the COVID-19 pandemic. This study addressed this by leveraging machine learning to analyse confirmed cases and support better decision-making. We compared ...
详细信息
One of the most pressing concerns in network forensics is the detection of cyber-attacks in the Internet of Things (IoT) networks and their devices. Traditional intrusion detection systems based on signature rules are...
详细信息
The brain is one of the main organs in the human body. It controls almost all the actions of a human being. Any problem with the brain can lead to even fatal consequences. One of the most dangerous problems faced by t...
详细信息
Globally, heart disease continues to claim countless lives, remaining a top killer, highlighting the need for accurate prediction models to aid in early diagnosis and intervention. To enhance heart attack prediction a...
详细信息
In the modern era of smart applications, video data is critically important in various contexts. In most of these applications, cameras are frequently incorporated to facilitate authentication. As a result, face recog...
详细信息
Massive knowledge graphs (KGs) are increasingly significant in modern information systems. Previous research on knowledge graph completion must gather sufficient training instances for new introduced relations in orde...
详细信息
A key idea in network security is situational awareness, which enables prompt detection and reaction to cybersecurity threats. This study investigates the use of crawler algorithms to improve situational awareness in ...
详细信息
A key idea in network security is situational awareness, which enables prompt detection and reaction to cybersecurity threats. This study investigates the use of crawler algorithms to improve situational awareness in network security. In this article, we look at the theoretical underpinnings of awareness of situations, the function of crawler algorithms, how they're used in security of networks, and how they affect threat and incident response. The network protection event database was created and constructed using data gathered from multiple Zhiming network security incident websites using the Scrappy web crawler framework, which improved the situational awareness research's data. In this study, a text-based network safety event evaluation instrument is built and executed in order to analyze the evaluation and interpretation of network security incidents, which is a critical component in the process of security awareness and perception. The crawler technique was used to build a network vulnerability event database that has 45,820 sets of data, which is an increase in capacity of 14.36% and 30.53% over the old approach and a reduction in reading time of 65.2% and 88.4%.
The global pursuit of sustainable energy solutions has led to the exploration of innovative technologies aimed at revolutionizing energy management and distribution. This paper presents integration of Blockchain and I...
详细信息
暂无评论